13
What is a System
Offense?
How do I
Investigate a
System Offense?
Step 1
Step 2
S
O
YSTEM
This chapter provides information on system offenses including:
What is a System Offense?
•
How do I Investigate a System Offense?
•
•
How do I Tune a System Offense?
An important component of a network security solution is monitoring the health
status of the hosts and connected devices. The possibility of a critical network
device or vital component of your network malfunctioning is a serious threat to your
network's security. STRM monitors system logs from security devices, network
devices, and host computers.
STRM generates a system offense when a host or device on your network reaches
a critical system state. By analyzing system logs from all supported devices, STRM
can accurately determine when a system has reached a critical state, potentially
leaving the network vulnerable or inoperable.
To investigate a system offense:
Click the Offense Manager tab.
The Offense Manager window appears.
Click By Category from the navigation menu.
The By Category view appears displaying high-level categories. The counts for
each category are accumulated from the values in the low-level categories.
Hint: Only low-level categories with associated offenses appear with an arrow.
You can click the arrow to view the associated low-level categories. If you wish to
view all categories, click Show Inactive Categories.
Offense Category Investigation Guide
FFENSES